<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Hi. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/2782727#M1032967</link>
    <description>&lt;P&gt;Hi.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;The IP addresses of known TOR exit nodes are included in the Security Intelligence feed.&lt;BR /&gt;You may block connections to these IP addresses by setting the category Tor_exit_node in&lt;BR /&gt;the blacklist column of your security intelligence settings for your applied access&lt;BR /&gt;control policy. Setting Any as the configured zone will block connections to and from&lt;BR /&gt;these IP addresses.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Policies --&amp;gt; Access Control --&amp;gt; Edit a policy --&amp;gt; Security Intelligence tab.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Aastha Bhardwaj&lt;/P&gt;
&lt;P&gt;Rate if that helps!!!&lt;/P&gt;</description>
    <pubDate>Mon, 14 Dec 2015 17:31:14 GMT</pubDate>
    <dc:creator>Aastha Bhardwaj</dc:creator>
    <dc:date>2015-12-14T17:31:14Z</dc:date>
    <item>
      <title>FirePOWER not blocking TOR (The Onion Router)</title>
      <link>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/2782726#M1032966</link>
      <description>&lt;P&gt;Dear friends,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;I have a system comprised of an ASA FirePOWER version 5.4.0.5 and a FireSIGHT 6.0.0 (running on top of VMware). &amp;nbsp;I installed the latest patch (patch 4).&lt;/P&gt;
&lt;P&gt;I configured an access policy including URL Filtering (it's correctly licensed). &amp;nbsp;I can see many URLs being filtered out of my traffic. &amp;nbsp;However, even with the "Tor_exit_node" inside the policy (please, check the attached screenshot), I get successful connections from the users - checking on users computers themselves. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;So, what else must be done to get this working?&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Thank you,&lt;/P&gt;
&lt;P&gt;Mauricio Harley&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 12:50:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/2782726#M1032966</guid>
      <dc:creator>mauricioharley</dc:creator>
      <dc:date>2019-03-12T12:50:28Z</dc:date>
    </item>
    <item>
      <title>Hi.</title>
      <link>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/2782727#M1032967</link>
      <description>&lt;P&gt;Hi.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;The IP addresses of known TOR exit nodes are included in the Security Intelligence feed.&lt;BR /&gt;You may block connections to these IP addresses by setting the category Tor_exit_node in&lt;BR /&gt;the blacklist column of your security intelligence settings for your applied access&lt;BR /&gt;control policy. Setting Any as the configured zone will block connections to and from&lt;BR /&gt;these IP addresses.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Policies --&amp;gt; Access Control --&amp;gt; Edit a policy --&amp;gt; Security Intelligence tab.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;Aastha Bhardwaj&lt;/P&gt;
&lt;P&gt;Rate if that helps!!!&lt;/P&gt;</description>
      <pubDate>Mon, 14 Dec 2015 17:31:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/2782727#M1032967</guid>
      <dc:creator>Aastha Bhardwaj</dc:creator>
      <dc:date>2015-12-14T17:31:14Z</dc:date>
    </item>
    <item>
      <title>Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/2782728#M1032968</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;One other thing to note the feeds are TOR exit nodes IPs not URLs, and not necessarily entry points.&lt;/P&gt;
&lt;P&gt;I agree with the previous comment - the best option is the security intelligence block.&lt;/P&gt;
&lt;P&gt;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Ed&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2015 11:03:17 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/2782728#M1032968</guid>
      <dc:creator>ed.sherratt</dc:creator>
      <dc:date>2015-12-18T11:03:17Z</dc:date>
    </item>
    <item>
      <title>Re: Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/3930040#M1032969</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;we did setup in application blocking TOR and Tor directory services. still not working.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Is it necessary to add the security intelligence fields in detection or blocking mode?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you!&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2019 11:14:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/3930040#M1032969</guid>
      <dc:creator>rick11</dc:creator>
      <dc:date>2019-09-25T11:14:47Z</dc:date>
    </item>
    <item>
      <title>Re: Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/3930128#M1032970</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/235820"&gt;@rick11&lt;/a&gt;&amp;nbsp;yes - add the SI section settings to block TOR effectively.&lt;/P&gt;
&lt;P&gt;Policies &amp;gt; Access Control. Edit your ACP. On the Security Intelligence tab choose TOR Exit nodes from the network list and apply to Blacklist action. Save and deploy.&lt;/P&gt;</description>
      <pubDate>Wed, 25 Sep 2019 13:10:50 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/3930128#M1032970</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2019-09-25T13:10:50Z</dc:date>
    </item>
    <item>
      <title>Re: Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/4679092#M1093082</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Is this solution still valid? i have tried it several times but not able to block TOR. We're also facing similar issue blocking Ultrasurf.&lt;/P&gt;
&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Wed, 31 Aug 2022 08:21:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/4679092#M1093082</guid>
      <dc:creator>telesymbol</dc:creator>
      <dc:date>2022-08-31T08:21:02Z</dc:date>
    </item>
    <item>
      <title>Re: Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/4912128#M1103832</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/326046"&gt;@Marvin Rhoads&lt;/a&gt; But how should we allow tor traffic for a legitimate web service hosted after fw while in SI tor_ext_node is Blocked&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 15:17:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/4912128#M1103832</guid>
      <dc:creator>MSJ1</dc:creator>
      <dc:date>2023-08-25T15:17:03Z</dc:date>
    </item>
    <item>
      <title>Re: Hi,</title>
      <link>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/4912167#M1103834</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1146335"&gt;@MSJ1&lt;/a&gt; are you saying you have a legitimate web site that's being blocked since it's identified as a TOR exit node?&lt;/P&gt;
&lt;P&gt;Generally speaking, we can manually whitelist specific addresses if the built-in categorization and SI update feed from Cisco Talos is incorrectly blocking an address.&lt;/P&gt;
&lt;P&gt;If it's a site you host, then the incorrect categorization should be reported via the form at &lt;A href="http://www.talosintelligence.com" target="_blank"&gt;www.talosintelligence.com&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 25 Aug 2023 16:16:19 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/firepower-not-blocking-tor-the-onion-router/m-p/4912167#M1103834</guid>
      <dc:creator>Marvin Rhoads</dc:creator>
      <dc:date>2023-08-25T16:16:19Z</dc:date>
    </item>
  </channel>
</rss>

